4.4 Review

Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope

Journal

JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS
Volume 102, Issue 1, Pages -

Publisher

SPRINGER
DOI: 10.1007/s10846-021-01378-2

Keywords

Multi-robot system; Coordination; Cooperation; Multi-robot task planning; Multi-robot motion planning; Exploration and mapping; Object transport and manipulation; Target observation

Funding

  1. University Grant Commission, Government of India [3525/(OBC)(NET-NOV 2017)]

Ask authors/readers for more resources

This paper provides a comprehensive research study on Multi-Robot Systems (MRS) coordination, covering basic terminology, categorization, application domains, and coordination approaches. By examining recent contributions, strengths, limitations, and future research directions are identified, along with a proposed taxonomy for classification. The analysis also delves into state-of-the-art parameters affecting MRS coordination efficiency and explores ways to improve coordination in various application domains.
Recently, Multi-Robot Systems (MRS) have attained considerable recognition because of their efficiency and applicability in different types of real-life applications. This paper provides a comprehensive research study on MRS coordination, starting with the basic terminology, categorization, application domains, and finally, give a summary and insights on the proposed coordination approaches for each application domain. We have done an extensive study on recent contributions in this research area in order to identify the strengths, limitations, and open research issues, and also highlighted the scope for future research. Further, we have examined a series of MRS state-of-the-art parameters that affect MRS coordination and, thus, the efficiency of MRS, like communication mechanism, planning strategy, control architecture, scalability, and decision-making. We have proposed a new taxonomy to classify various coordination approaches of MRS based on the six broad dimensions. We have also analyzed that how coordination can be achieved and improved in two fundamental problems, i.e., multi-robot motion planning, and task planning, and in various application domains of MRS such as exploration, object transport, target tracking, etc.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Optimized extreme learning machine for detecting DDoS attacks in cloud computing

Gopal Singh Kushwah, Virender Ranga

Summary: This paper proposes a DDoS attack detection system based on an improved Self-adaptive evolutionary extreme learning machine (SaE-ELM), which achieves high detection accuracy on multiple datasets. The system shows significantly improved learning and classification capabilities, outperforming other techniques in performance.

COMPUTERS & SECURITY (2021)

Article Telecommunications

Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking

Rochak Swami, Mayank Dave, Virender Ranga

Summary: Software-defined networking (SDN) is an advanced technology that provides flexibility and cost-efficiency based on business requirements. This study focuses on the impact of spoofed and non-spoofed TCP-SYN flooding attacks on controller resources in SDN architecture, and proposes a machine learning based intrusion detection system.

WIRELESS PERSONAL COMMUNICATIONS (2021)

Article Telecommunications

Middlebox selection optimization via an intelligent framework in software-defined networking

Ehsan Zadkhosh, Hossein Bahramgiri, Masoud Sabaei

Summary: In this article, an intelligent dynamic routing framework based on SDN architecture with the use of genetic algorithm (GA) for performance optimization is proposed. By extracting CPU, memory, and bandwidth utilization of middleboxes (MBs) as dynamic routing parameters and calculating impact factors (IFs), the network performance is improved.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Telecommunications

Detecting DDoS Attacks in Cloud Computing Using Extreme Learning Machine and Adaptive Differential Evolution

Gopal Singh Kushwah, Virender Ranga

Summary: In this paper, a hybrid machine learning model based approach is proposed to detect DDoS attacks in cloud computing. The model utilizes extreme learning machine and adaptive differential evolution to optimize the weights, and analytically determines the connection weights. The performance of the system is evaluated using three state-of-the-art datasets.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Review Computer Science, Artificial Intelligence

Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

Ankit Attkan, Virender Ranga

Summary: The Internet of Things (IoT) has gained significant attention in recent years for its ability to improve lifestyles and keep up with technological advancements. IoT edge devices have different technologies and storage formats, requiring secure mutual authentication for data transmission. Blockchain and AI are integrated into IoT networks for enhanced security, with blockchain storing validated session keys and AI providing better adaptability against attacks.

COMPLEX & INTELLIGENT SYSTEMS (2022)

Article Computer Science, Information Systems

UAVs assisted Network Partition Detection and Connectivity Restoration in Wireless Sensor and Actor Networks

Aditi Zear, Virender Ranga

Summary: This paper presents a solution for UAV-assisted network partition detection and connectivity restoration. The proposed algorithm outperforms existing techniques in terms of recovery time, distance traveled by UAVs, and number of relay nodes deployed. The paper also provides a new framework covering all aspects required for network partition recovery.

AD HOC NETWORKS (2022)

Article Engineering, Electrical & Electronic

Partition detection and recovery by UAVs in damaged WSANs using N-angle clustering

Aditi Zear, Virender Ranga, Kriti Bhushan

Summary: This paper introduces an approach for partition detection and recovery in damaged WSANs using unmanned aerial vehicles (UAVs), which outperforms existing algorithms in terms of recovery time, relay nodes, and UAVs' travel distance.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

An intellectual intrusion detection system using Hybrid Hunger Games Search and Remora Optimization Algorithm for IoT wireless networks

Ravinder Kumar, Amita Malik, Virender Ranga

Summary: Smart devices connected to the internet, known as the Internet of Things (IoT), have advantages in improving interaction but also raise privacy and security concerns. This study proposes a hybrid Hunger Games Search and Remora Optimization Algorithm (HHGS-ROA) to address security problems in IoT networks, achieving better performance than existing methods.

KNOWLEDGE-BASED SYSTEMS (2022)

Article Engineering, Multidisciplinary

IQR-based approach for DDoS detection and mitigation in SDN

Rochak Swami, Mayank Dave, Virender Ranga

Summary: Software-defined networking (SDN) is a networking paradigm that focuses on decoupling control logic from the data plane, bringing programmability and flexibility to network management. SDN faces security issues such as control plane exhaustion and switch buffer overflow. This paper presents a defense solution implemented in the SDN controller to detect and mitigate spoofed flooding DDoS attacks using statistical measures and existing SDN capabilities.

DEFENCE TECHNOLOGY (2023)

Article Computer Science, Information Systems

Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs

Aditi Zear, Virender Ranga, Kriti Bhushan

Summary: This paper presents a new solution for coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs (UAV-BITS). UAV-BITS employs multiple UAVs to identify network partitions and guide network nodes to self-identify their partitions by creating Connected Component Sets (CCSs) iteratively. During the network recovery process, UAV-BITS creates two-vertex disjoint paths between network partitions to ensure a fault-tolerant network topology. Simulation results show that UAV-BITS provides a better fault-tolerant network topology compared to existing solutions, while also reducing UAV travel distance and detection time.

COMPUTER COMMUNICATIONS (2023)

Article Telecommunications

Mitigation of DDoS Attack Using Moving Target Defense in SDN

Rochak Swami, Mayank Dave, Virender Ranga

Summary: Software-defined networking (SDN) is a networking paradigm that separates control logic from data plane for increased programmability and flexibility. However, SDN faces security issues such as control plane exhaustion and switch buffer overflow, which can hinder its growth and adoption. In this paper, a defense solution based on moving target defense (MTD) and existing SDN capabilities is proposed to mitigate spoofed flooding DDoS attacks. The solution is implemented in the Ryu controller and evaluated using CPU usage, showing effective mitigation of the attack.

WIRELESS PERSONAL COMMUNICATIONS (2023)

Review Telecommunications

Security concerns over IoT routing using emerging technologies: A review

Ravinder Kumar, Amita Malik, Virender Ranga

Summary: This paper discusses the security vulnerabilities of the RPL protocol in IoT and proposes solutions. It provides an overview of the IoT stack model and examines the security concerns of the RPL protocol. Different types of attacks and their defense solutions are compared, and the use of emerging technologies like ML, Blockchain, and Cloud Storage for IoT security is explored. The paper also identifies research challenges and suggests future research directions for IoT security.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2023)

Article Computer Science, Information Systems

A Rubik's Cube Cryptosystem-based Authentication and Session Key Generation Model Driven in Blockchain Environment for IoT Security

Ankit Attkan, Virender Ranga, Priyanka Ahlawat

Summary: Over the past decade, IoT has made significant progress in terms of technology exploration, integration, and various applications despite its resource-bound architecture. The challenge lies in running high-end security protocols on Edge devices, which are highly vulnerable to cyber-attacks. To address this, proper mutual authentication and session key establishment are crucial, and a Rubik's cube puzzle-based cryptosystem is proposed in this article for parameter exchange. Incorporating blockchain technology ensures anonymity of token transactions, and a session key pool randomizer is used to prevent probabilistic attacks. The hybrid model generates secure session keys for mutual authentication and reliable data transferring tasks, exhibiting promising results in terms of efficiency, light weightiness, and practical applications.

ACM TRANSACTIONS ON INTERNET OF THINGS (2023)

Article Environmental Sciences

A novel approach for forecasting PM2.5 pollution in Delhi using CATALYST

Abhishek Verma, Virender Ranga, Dinesh Kumar Vishwakarma

Summary: This research article introduces a new approach for forecasting PM2.5 pollution in Delhi by combining a pre-trained CNN model with a transformer-based model called CATALYST. The proposed CATALYST model incorporates advancements in the transformer-based architecture and utilizes a sliding window training approach to predict future pollution levels. The experiments demonstrate that this model outperforms conventional methods and has the potential to accurately forecast PM2.5 pollution.

ENVIRONMENTAL MONITORING AND ASSESSMENT (2023)

No Data Available